首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7045篇
  免费   885篇
  国内免费   693篇
电工技术   168篇
技术理论   2篇
综合类   660篇
化学工业   54篇
金属工艺   16篇
机械仪表   138篇
建筑科学   256篇
矿业工程   23篇
能源动力   31篇
轻工业   207篇
水利工程   20篇
石油天然气   15篇
武器工业   20篇
无线电   1493篇
一般工业技术   249篇
冶金工业   460篇
原子能技术   13篇
自动化技术   4798篇
  2024年   11篇
  2023年   84篇
  2022年   148篇
  2021年   171篇
  2020年   226篇
  2019年   169篇
  2018年   179篇
  2017年   215篇
  2016年   290篇
  2015年   289篇
  2014年   475篇
  2013年   461篇
  2012年   570篇
  2011年   611篇
  2010年   511篇
  2009年   543篇
  2008年   600篇
  2007年   566篇
  2006年   459篇
  2005年   414篇
  2004年   336篇
  2003年   272篇
  2002年   225篇
  2001年   141篇
  2000年   127篇
  1999年   109篇
  1998年   78篇
  1997年   49篇
  1996年   43篇
  1995年   33篇
  1994年   32篇
  1993年   29篇
  1992年   29篇
  1991年   18篇
  1990年   7篇
  1989年   10篇
  1988年   13篇
  1987年   8篇
  1986年   10篇
  1985年   13篇
  1984年   10篇
  1983年   3篇
  1982年   11篇
  1981年   7篇
  1980年   4篇
  1977年   2篇
  1962年   1篇
  1961年   1篇
  1960年   1篇
  1959年   2篇
排序方式: 共有8623条查询结果,搜索用时 234 毫秒
1.
Recent generative adversarial networks (GANs) have yielded remarkable performance in face image synthesis. GAN inversion embeds an image into the latent space of a pretrained generator, enabling it to be used for real face manipulation. However, current inversion approaches for real faces suffer the dilemma of initialization collapse and identity loss. In this paper, we propose a hierarchical GAN inversion for real faces with identity preservation based on mutual information maximization. We first use a facial domain guaranteed initialization to avoid the initialization collapse. Furthermore, we prove that maximizing the mutual information between inverted faces and their identities is equivalent to minimizing the distance between identity features from inverted and original faces. Optimization for real face inversion with identity preservation is implemented on this mutual information-maximizing constraint. Extensive experimental results show that our approach outperforms state-of-the-art solutions for inverting and editing real faces, particularly in terms of face identity preservation.  相似文献   
2.
This paper presents a novel No-Reference Video Quality Assessment (NR-VQA) model that utilizes proposed 3D steerable wavelet transform-based Natural Video Statistics (NVS) features as well as human perceptual features. Additionally, we proposed a novel two-stage regression scheme that significantly improves the overall performance of quality estimation. In the first stage, transform-based NVS and human perceptual features are separately passed through the proposed hybrid regression scheme: Support Vector Regression (SVR) followed by Polynomial curve fitting. The two visual quality scores predicted from the first stage are then used as features for the similar second stage. This predicts the final quality scores of distorted videos by achieving score level fusion. Extensive experiments were conducted using five authentic and four synthetic distortion databases. Experimental results demonstrate that the proposed method outperforms other published state-of-the-art benchmark methods on synthetic distortion databases and is among the top performers on authentic distortion databases. The source code is available at https://github.com/anishVNIT/two-stage-vqa.  相似文献   
3.
《Ceramics International》2022,48(3):3495-3503
The photochromic phenomenon has been recently used as a fascinating technology in the development of highly efficient anti-counterfeiting materials with dual-mode security encoding of concurrent photochromism and fluorescence emission. Herein, we successfully developed lanthanide-doped aluminate nanoparticles (LAN)/polystyrene (PS) electrospun nanofibers as novel secure authentication films. Different ratios of lanthanide-doped aluminate nanoparticles were mixed with polystyrene-based copolymer solutions in N,N-dimethylformamide (DMF) and subjected to electrospinning to afford photochromic and fluorescent nanofibers. The generated electrospun nanofibers demonstrated a narrow diameter distribution, a smooth surface and well-defined morphological properties. The produced smart nanofibers were applied onto cellulose paper sheets to demonstrate a dual-mode secure strategy with a simple and rapid authentication. LAN was prepared in the nano-scale for better dispersion in PS, which guarantee the formation of transparent films. LAN was studied by transmission electron microscope (TEM) and X-ray diffraction (XRD). LAN displayed diameters of 5–12 nm. On the other hand, the fibrous diameters of LAN-PS samples were studied by scanning electron microscopy (SEM) to indicate diameters of 200–300 nm. The induced security marking was invisible (363 nm) under visible daylight turning into visible green (520 nm) color under ultraviolet irradiation demonstrating a bathochromic shift. Both excitation and emission displayed high intensities. The security marking was fully reversible under ultraviolet/visible irradiation cycles without fatigue. Those advantageous properties could be attributed to the high surface area of the chromogenic nanofibrous films to result in high absorption of light leading to strong optical dual-mode photo-responsiveness. The generated LAN-PS hybrid films showed improved hydrophobic properties with increasing LAN. The nanofibers showed transparency, stretchability and flexibility. The present strategy can be reported as an efficient technology to develop many anti-counterfeiting products toward a better market with social and economic values to avoid fake products.  相似文献   
4.
无线体域网中传输的是与生命高度相关的敏感数据,身份认证是信息安全保护的第一道防线。现有的基于人体生物信息的身份认证方案存在信息难提取、偶然性大和误差性大的问题,基于传统密码学的认证方案需较大计算资源和能量消耗,并不适用于无线体域网环境。为此,在动态口令和非对称加密机制基础上,提出一种适用于无线体域网的动态口令双向认证轻量协议,并对其进行形式化分析。通过理论证明、SVO逻辑推理及SPIN模型检测得出:该协议满足双向认证,且能够抵御重放攻击、伪装攻击、拒绝服务器攻击和口令离线攻击,具有较高安全性。  相似文献   
5.
采用“区块链技术+不对称加密+生物识别+身份认证”应用模式,依托智能手机客户端设计与开发一套铁路旅客身份认证系统.基于Ethereum开发平台,应用truffle开发框架,实现铁路旅客身份认证系统智能合约的编写与部署.系统针对传统铁路身份认证模式的不足,将旅客身份数据分布式存储,弱化中心化服务器的压力,提升旅客身份数据的安全性和鲁棒性;进行生物信息认证确保旅客对身份信息的所有权;利用非对称加密技术在保护旅客隐私、实现实名制的前提下增强数据的透明性.基于区块链应用模式的铁路旅客身份认证系统能够让用户身份实现本地存储、信息摘要链上校验,实现铁路旅客身份信息数据访问的细粒度控制,保障铁路旅客身份信息安全,提升铁路旅客的乘车体验.  相似文献   
6.
The use of quality control tool for authentication of Jadwar (Delphinium denudatum Wall. ex Hook.f. & Thomson), a folk herbal drug used for the treatment of different ailments, was studied. People face problems of adulteration for this drug at global, regional, national and local levels. Two different plant species are commercially marketed in the Indo‐Pak Subcontinent under the same trade name of Jadwar. One is D. denudatum Wall. ex Hook.f. & Thomson and the other is Aconitum heterophyllum Wall. ex Royle. To focus on this problem, a marketable available drug sample of Jadwar was authenticated by using basic microscopy tools (LM) and advanced chemo‐taxonomic markers. Authentication, quality and standardization of this drug was achieved using morphology, organoleptography, UV and IR analyses, scanning electron microscopy of pollen and anatomical investigations. The techniques used for authentication marked the clear difference between the studied plants. Microscopic studies, chemotaxonomic investigation and other techniques used in this project provided the basis for the authentication of this species.  相似文献   
7.
从MR原始数据特性出发研究数据结构与字段,采用基于线状特性分析MR大数据的地铁用户识别过滤方法和位置定位方法,该方法经过验证能够有效输出地铁用户数据并定位在地图上,解决人工地铁测试效率低且测试片面的问题,实现基于大数据的自动化地铁网络评估,提供海量的有效定位数据用于地铁评估与分析。  相似文献   
8.
安全和效率是影响无证书认证组密钥协商协议能否在Ad Hoc网络中得到实际应用的两个关键因素。针对这两个关键因素,以提高Ad Hoc网络安全组通信的安全性和效率为目标,提出一个无证书认证组密钥协商协议,基于椭圆曲线密码体制(ECC)点乘运算实现无配对的无证书认证组密钥协商和身份认证;并使用Huffman密钥树优化通信轮数,以降低计算量和通信量,提高组密钥协商效率。安全分析和性能分析表明,与现有基于无证书的组密钥协商协议相比,所提方案在组密钥协商时具有较高的效率和安全性,可以满足资源受限条件下组密钥建立以及组成员变动带来的密钥更新问题。  相似文献   
9.
The use of a secure and robust digital identification system that is capable of protecting privacy is an essential, reliable and user-friendly element for a strong cyber resilience strategy and is a source of new business opportunities and applications for banks, private sector with a return on their investment.The march towards Digital Identity is well underway therefore, focus should be on both adoption and adaption of the new structures and regulations. These are needed to govern the associated services and transactions as well as establishing laws that enforce penalties for violations.There is no doubt then that more and more entities and institutions would move to the cloud. Security challenges affecting the cloud may not be new but the mode of addressing them would be different. The authors develop a Data Colouring technique for securing data processed or stored on both cloud and non-cloud platforms. The technique combines Public Key Infrastructure (PKI), concatenated fingerprints and digital watermarking. Using this technique, data can be secured at creation or during storage and remains secure during processing.  相似文献   
10.
针对软件定义网络中,控制器无法保证下发的网络策略能够在转发设备上得到正确执行的安全问题,提出一种新的转发路径监控安全方案。首先以控制器的全局视图能力为基础,设计了基于OpenFlow协议的路径凭据交互处理机制;然后采用哈希链和消息验证码作为生成和处理转发路径凭据信息的关键技术;最后在此基础上,对Ryu控制器和Open vSwitch开源交换机进行深度优化,添加相应处理流程,建立轻量级的路径安全机制。测试结果表明,该机制能够有效保证数据转发路径安全,吞吐量消耗比SDN数据层可信转发方案(SDNsec)降低20%以上,更适用于路径复杂的网络环境,但时延和CPU使用率的浮动超过15%,有待进一步优化。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号